• Phishing -Trying to obtain personal information over the internet. A security attack that relies on social engineering.
    • Worm -A software program capable of reproducing itself that can spread from one computer to the next over a network
    • VPN - virtual private network - they connect to external hosts through authentication and encryptionEnables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network.
    • PGP - pretty good privacyA data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication
    • Audit Log -A security-relevant chronological record, set of records, or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event
    • Availability-A general term that is used to describe the amount of time over a one-year period that the system resources is available in the wake of component failures in the system
    • Encryption -The translation of data into a secret code. It is the most effective way to achieve data security. To read one of these files, you must have access to a password that enables you toe decrypt it.
    • Wireless N -An extension to 802.11 specification developed by the IEEE for wireless LAN technology
    • Backbone -Another term for bus, the main wire that connects to nodes. The term is often used to describe the main network connections composing the Internet
    • Router -A device that forwards data packets along networks. It is connected to at least two networks and are located at gateways, the places where two or more networks connect
    • Relevance -Denotes how well a retrieved documents or set of documents meets the information need of the user
    • Torrent -A file distribution system used for transferring files across a network of people. As you download a file, BitTorrent places what you download on upload for other users.
    • Packet Jam -Refers to packets that are delayed resulting in a document that cannot be reassembled or displayed.
    • Buffer Overflow -When data transferred to a buffer exceeds the storage capacity of the buffer and some of the data "overflows" into another buffer, one that the data was not intended to go in. This can cause corrupt data.
    • Logic Bomb -Programming code added to the software of an application or operating system that lies dormant until a predetermined period of time or event occurs, triggering the code into action. Typically are malicious in intent, acting in the same ways as a virus of Trojan horse once activated.
    • Social Engineering -The act of obtaining or attempting to obtain otherwise secures data by conning an individual into revealing secure information.
    • Strong Passwords -A passwords that is difficult to detect by both humans and computer programs. Consists of at least six characters that are a combination of letters, numbers and symbols, and is case-sensitive.
    • Confidentiality -Discretion in keeping secret information
    • Authentication -The process of identifying and individual, usually based on a username and password. Ensures that the individual is who he/she claims to be.
    • Wireless G -A 54 Mbps wireless networking standard that has become popular due to its speed advantage over the widely used Wireless-B standard
    • Switch -In networks, a device that filters and forwards packets between LAN segments. These operate at the data link layer and sometimes the network layer of the OSI Reference Model and therefore support any packet protocol.
    • Internet 2 -A testing-ground networking environment where universities, companies, and government laboratories work together and develop advanced Internet technologies such as telemedicine, digital libraries and virtual laboratories.
    • TCP/IP -The suite of communications protocols used to connect hosts on the Internet.
    • Popularity -The term used to describe the value of a web site.
    • Broadband -The term used to describe a type of data transmission in which a single wire can carry several channels at once.
    • IP address -An identifier for a computer or device on a TCP/IP network.
    • Virus -A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
    • Firewall -Used to prevent unauthorized Internet users from accessing private networks connected to the Internet. It can either be a packet filter, application gateway, circuit-level gateway, or a proxy sever.
    • Spam -Electronic junk mail
    • PKI -A system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. Necessary for electronic commerce (buying stuff online)
    • Integrity -The assurance that information can only be accessed or modified by those authorized to do so.
    • DNS -An Internet service that translates domain names into IP addresses.
    • Hub -
      external image spacer.C9xH.gif
      external image spacer.C9xH.gif

      A common connection point for devices in a network. Commonly used to connect segments of a LAN. Contains multiple ports, and when a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all the packets
    • LAN -A computer network that spans a relatively small area. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN.
    • NLR - National LambdaRailAn unfettered resource for research and commercial innovation, that it is the only national fiber optic network in the world that hosts research traffic from universities and government agencies alongside data from corporations, and that this has catalyzed regional broadband development around the country
    • FTP -The protocol for exchanging files over the Internet. It uses the Internet's TCP/IP protocols to enable data transfer
    • Bit -The smallest unit of information on a machine
    • P2P -Peer-to-peer software that permits direct Internet-based communication. Collaboration between two or more personal computers while bypassing centralized servers.
    • Cookie -A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.



  • How to Achieve Computer Security
    • Security principles/concepts: explore general principles/concepts that can be used as a guide to design secure information processing systems
    • Security mechanisms: explore some of the security mechanisms that can be used to secure information processing systems
    • Physical/organizational security: consider physical and organizational security measures

  • Security Defined: CIA
    • Confidentiality: prevent unauthorized disclosure of information
    • Integrity: prevent unauthorized modification of information
    • Availability: prevent unauthorized withholding of information